If the across-the-board cut in federal spending known as sequestration goes into effect at the end of the week, it could take weeks for the process of formally notifying employees of impending furloughs to unfold at many agencies. That would mean, in many cases, that individual employees would not be subject to furloughs until some time in April.

But some agencies already have met their legal obligation to inform employees of furloughs, and could begin them in March, according to the Office of Management and Budget.

The Justice Department and the National Labor Relations Board already have issued formal furlough notices to individual employees, OMB said in a statement provided to Government Executive. In general, such notices must be sent out 30 days in advance of a furlough. But the 30-day notice requirement does not apply to all federal employees, OMB noted.

Many agencies, including the Defense Department, have communicated generally to their employees that should sequestration go into effect, they will be forced to furlough some or all of their workers. One, the Federal Aviation Administration, has notified its 47,000 employees that nearly all of them will be subjected to furloughs of approximately one day per pay period in the event of a sequester. These informal notices do not trigger the 30-day warning period.

Once formal furlough notices are sent, many agencies will have to begin the process of bargaining with labor unions representing employees over their specific terms. At some agencies, preliminary discussions with unions already are under way.

For updated details on agencies’ plans, see Government Executive’s Furlough Watch.

By using this service you agree not to post material that is obscene, harassing, defamatory, or
otherwise objectionable. Although GovExec.com does not monitor comments posted to this site (and
has no obligation to), it reserves the right to delete, edit, or move any material that it deems
to be in violation of this rule.

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.